Delivery-Date: Sat, 29 Aug 2015 05:02:50 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 909581E03D1;
	Sat, 29 Aug 2015 05:02:48 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 1B8B3374E4;
	Sat, 29 Aug 2015 09:02:41 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 0B1F9374E2
 for <tor-talk@lists.torproject.org>; Sat, 29 Aug 2015 09:02:38 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 7VuHOxkE2xFQ for <tor-talk@lists.torproject.org>;
 Sat, 29 Aug 2015 09:02:37 +0000 (UTC)
Received: from mail2.openmailbox.org (mail2.openmailbox.org [62.4.1.33])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id D2B5F374BA
 for <tor-talk@lists.torproject.org>; Sat, 29 Aug 2015 09:02:37 +0000 (UTC)
X-Greylist: delayed 451 seconds by postgrey-1.34 at eugeni;
 Sat, 29 Aug 2015 09:02:37 UTC
Received: by mail2.openmailbox.org (Postfix, from userid 1004)
 id D79952AC2813; Sat, 29 Aug 2015 10:55:02 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1440838502;
 bh=Vxkscz+t8i+WfBQFlKttG1chxWBHzuX3JFetsj776cI=;
 h=From:To:Subject:Date:From;
 b=CneKE1EEYP/I4OysDAJzov+6Wq0WsO1sH3Lfr1t1FL7xDtILzd3HzANA1HYkO6Ed8
 3ICzk1BvrnbX2QUQHFLaGLhazCAQ5YvtMLCqNJYG+wevqlgtB/mxL7cp+qmunfFihP
 5DpGUJ7WYbqVWjFnQQogrAQkcGYpR49Hl0t8z/Qg=
From: blaatenator <blaatenator@openmailbox.org>
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1440838502;
 bh=Vxkscz+t8i+WfBQFlKttG1chxWBHzuX3JFetsj776cI=;
 h=From:To:Subject:Date:From;
 b=CneKE1EEYP/I4OysDAJzov+6Wq0WsO1sH3Lfr1t1FL7xDtILzd3HzANA1HYkO6Ed8
 3ICzk1BvrnbX2QUQHFLaGLhazCAQ5YvtMLCqNJYG+wevqlgtB/mxL7cp+qmunfFihP
 5DpGUJ7WYbqVWjFnQQogrAQkcGYpR49Hl0t8z/Qg=
X-Enigmail-Draft-Status: N1110
To: tor-talk@lists.torproject.org
Message-ID: <55E17366.1050205@openmailbox.org>
Date: Sat, 29 Aug 2015 10:55:02 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:40.0) Gecko/20100101
 Thunderbird/40.0
MIME-Version: 1.0
Subject: [tor-talk] hardware recommendations
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi all,

The talk of Jacob at DebConf (especially the Citizen Four Q&A) got me
thinking about hardware. I know that hardware rng's are suspect, and
probably AES cpu extensions as well. And if Lenovo openly puts stuff in
the BIOS, who knows what else might be in there. Also someone there
mentioned ARM cpu's might be a better bet regarding backdoors (but what
is that opinion based on?).

There was a mention of a 'sort of' open source smart card product and a
certain type of laptop brand (but I didn't catch the names unfortunately).
Are there more recommendations regarding this sort of stuff? Like a
'best buy' guide for secure hardware, or ways to work around insecure
hardware.



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

